Delay-minimal Transmission for Energy Constrained Wireless Communications

Size: px
Start display at page:

Download "Delay-minimal Transmission for Energy Constrained Wireless Communications"

Transcription

1 Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 Abstract We investigate the problem of minimizing the overall transmission delay of data packets in a single-user wireless communication system, where the transmitter has a fixed amount of energy to transmit all of the data packets. We consider two different scenarios. In the first scenario, we assume that packets arrive randomly at the transmitter. We propose two different approaches to solve this problem. First, we develop an iterative algorithm that allocates the total energy of the transmitter to its individual packets, in a way to minimize the total delay. As a second approach, we develop a dynamic programming formulation for the problem. In the second scenario, we assume that all of the packets have already arrived before the transmission starts. In this situation, the cost function has a fixed form, and is convex and differentiable. In this scenario, the iterative algorithm we develop is guaranteed to converge to the unique global optimal solution. I. INTRODUCTION For many wireless networks, especially for sensor and mobile ad-hoc networks, efficient consumption of energy is a critical issue, since energy is severely limited in such networks, and is even non-renewable in some cases. Consequently, a plethora of energy efficient methods and algorithms have been developed under various system settings and for various optimality criteria. Reference [1] considers the problem of minimizing the energy used in transmitting packets in a single-user system subject to a deadline by which all packets must be transmitted. It develops an algorithm, coined lazy scheduling algorithm, where the transmission time of each packet is increased as much as possible, subject to the deadline and causality constraints i.e., all packets must be transmitted by a deadline and a packet may not be transmitted before it arrives), in order to minimize the total energy consumed in transmitting the packets. In [2], the authors extend the single-user problem to a multi-user case and develop an iterative algorithm. The algorithm is named MoveRight where at any iteration only two consecutive packets are considered, and the starting points of the transmission of the two packets are moved to the right hence the name). The authors prove that this algorithm converges to the optimal scheduling of the packets that minimizes the total energy. In [3], the authors extend their energyminimizing approaches to wider scenarios, such as multipleaccess and broadcast channels, and to channels with fading. This work was supported by NSF Grants CCF , CCF , CNS and CCF Dynamic programming DP) is another approach which has been broadly adopted in wireless optimal power/energy allocation problems. In [4], the authors use DP to jointly optimize the long-term average transmission power and average buffer delay. Reference [5] proposes a DP formulation to find optimal power, channel coding and source coding policies with a delay constraint. Reference [6] uses DP to maximize the K- block constrained capacity through adaptively allocating power across blocks according to the varying channel condition. Reference [7] uses DP to calculate the optimal power/rate control policies to minimize the average delay under an average power constraint. Reference [8] uses DP to solve the problem of maximizing the data throughput for an energy- and deadline-constrained transmitter over a fading channel. In this paper, we consider the dual of the problem considered in [1]. For a single-user system, our objective is to minimize the overall delay of the packets subject to an energy constraint on the transmitter. The delay includes both the queuing time and the transmission time for the packet. Our aim is to allocate the total energy over all packets in a way to minimize the overall delay of the system. We investigate two different settings. In the first setting, we assume that the packets arrive randomly during the transmissions, while in the second setting, we assume that all of the packets have arrived and are ready for transmission before the transmission starts. We formulate both problems as convex minimization problems. However, we see that there are important structural differences between the two problems. In the first setting, even though the overall cost function is convex in the energies allocated to the packets, it is not differentiable. The reason for this is that the cost function takes different forms in different regions of allowable energy distributions. In other words, the energy allocated to a packet affects the form of the cost function for later packets. In the second setting, the cost function is convex, has a fixed form, and is differentiable. For the first setting, unlike [1], our problem does not admit a closed-form solution. Therefore, we develop an iterative algorithm that is based on the principle of decreasing the overall delay at each iteration. We prove that the proposed algorithm decreases the overall delay monotonically. However, due to the non-differentiability of the overall delay function, the proposed algorithm may converge to a suboptimal fixed point. In order to overcome this problem, we use two modifications on our algorithm: increasing the dimensionality of the sub-problem solved at each iteration i.e., considering more than two packets at any given iteration),

2 d 3 d M 1 t 1 t 2 t 3 t 4 t M 1 D M 1 t M D M Fig. 1. System model with random packet arrivals. and ɛ-perturbation of the sub-optimal fixed points. In addition, we develop a DP based formulation for the same problem. For the second setting, we formulate the standard Lagrangian based approach, and also develop an iterative algorithm. Since the cost function has a fixed form and is differentiable, the iterative algorithm is guaranteed to converge to the unique global optimum solution. II. SCENARIO I: RANDOM PACKET ARRIVALS We consider a non-fading single-user wireless channel. We assume that M packets arrive at the transmitter randomly at times t 1, t 2,, t M, where the inter-arrival times are denoted as,,, d M 1 ; see Fig. 1. The transmitter has a total energy constraint which is denoted by E. Let e i denote the energy allocated for the transmission of packet i, then M e i E. Since the channel is non-fading, we can express the relationship between the transmission duration of τ i and the energy spent in its transmission e i, for packet i, as a deterministic function τ i = fe i ). Without loss of generality, as in [1], [3], we assume that fe) satisfies the following properties: i) fe) 0, ii) fe) decreases monotonically in e, iii) fe) is strictly convex in e, iv) fe) is continuously differentiable, and v) fe) as e 0. As shown in [1], [3], the first four conditions are satisfied in realistic channel coding schemes. The last condition is reasonable as a packet cannot be transmitted with zero energy. Let D i denote the delay experienced by the i-th packet, which includes the waiting time in the queue and the transmission time. Then, the delay experienced by each packet can be written recursively as, = fe 1 ) = ) + + fe 2 ) = ) + + fe 3 ). D M = D M 1 d M 1 ) + + fe M ) 1) where x) + = max0, x). Here, for the i th packet, D i 1 d i 1 ) + denotes the waiting time in the queue, and fe i ) denotes the actual transmission time. Then, we can express our optimization problem as min D i e i E e i 0, i = 1, 2,, M 2) where the parameters of the optimization are the energies allocated to all packets, {e i } M, and the givens of the optimization problem are the total energy E and the inter-arrival times of the packets {d i } M. Intuitively, the optimization problem in 2) is a convex optimization problem since function fe i ) is convex and a linear combination of convex functions is convex. However, the existence of ) + function complicates matters, and the joint convexity of the cost function with respect to all e i, i.e., with respect to e = [e 1 e 2 e M ] needs to be proved. Theorem 1: The objective function in 2) is convex with respect to e. Proof: We will prove the convexity recursively. First, we note that = fe 1 ) and fe 1 ) is convex in e 1. We also note that = fe 1 ) ) + + fe 2 ) and the function fe 1 ) ) + is convex in e because of the convexity of the function fe 1 ) in e 1. Thus, is convex in e also. ) + Then, we look at = fe 1 ) ) + + fe 2 ) + fe 3 ). We let F e) = fe 1 ) ) + + fe 2 ). We note that F e) itself is convex in e, and we need to prove that F e)) + is convex in e as well. Using the definition of ) +, for any two vectors e and e in the constraint set, we have λf e) λ)f e ) + λf e) + 1 λ)f e ) If F λe + 1 λ)e ) is positive, we have F λe + 1 λ)e ) 3) λf e) λ)f e ) + F λe + 1 λ)e ) = F λe + 1 λ)e ) + 4) If F λe+1 λ)e ) is negative, then F λe+1 λ)e ) + = 0. Using the nonnegativity of the ) + function, we have λf e) λ)f e ) + 0 Therefore, using 4) and 5), we conclude that = F λe + 1 λ)e ) + 5) λf e) λ)f e ) + F λe + 1 λ)e ) + 6) which implies that F e)) + is convex in e. Therefore, is convex in e as well. The convexity of D i d i ) + for i = 4,, M 1 can be proved in a similar manner. Since the objective function can be expressed as M 1 D i = D i d i ) + + fe i ) 7) and since each term in the cost function is convex in e, the linear combination is convex in e as well. Therefore, our problem is a convex minimization problem which has a convex objective function and linear constraints. However, there are two main difficulties in this optimization

3 problem. First, since the overall delay includes both the queuing time and the transmission time of the packets, the transmission time for a packet affects the queuing time of all of the following packets. This causes the queuing time of earlier packets to be multiply counted in the objective function. This leads to the varying coefficients before fe i ) s in the cost function, which implies that the convexity of f ) alone will not provide us a closed-form solution; we note that the convexity of the cost function alone provided a closed-form solution in [1] due to the symmetry in the cost function. Secondly, because of the existence of ) + function in the overall delay expression, the cost function has nondifferentiable points. In addition, depending on whether the insides of ) + functions are negative or positive, we have 2 M possible cost functions. Since the number of different cost functions to consider grows exponentially with the number of packets, standard Lagrangian method is not tractable here. In the following, we will use a simple 3-packet problem to illustrate the difficulties involved in solving this convex optimization problem. Using the definition of D i in 1), the 3-packet problem is min fe 1 ) + f e 1 ) ) + + fe 2 ) + f e 1 ) ) + + fe 2 ) ) + + fe3 ) e 1 + e 2 + e 3 E, e 1, e 2, e 3 0 8) Opening the parentheses, we have four different possible cases: Case 1: Both the transmission of the first and second packets end before the arrival of the next packet, i.e., insides of both ) + functions are negative. This case is illustrated in Fig. 2. In this case, we have min fe 1 ) + fe 2 ) + fe 3 ) fe 1 ), fe 2 ) e 1 + e 2 + e 3 E, e 1, e 2, e 3 0 9) Case 2: The transmission of the first packet ends after the arrival of the second packet, while the transmission of the second packet ends before the arrival of the third packet. This case is illustrated in Fig. 3. In this case, we have min 2fe 1 ) + fe 2 ) + fe 3 ) fe 1 ) >, fe 1 ) + fe 2 ) + e 1 + e 2 + e 3 E, e 1, e 2, e ) Case 3: The transmission of the first packet ends before the arrival of the second packet, while the transmission of the second packet ends after the arrival of the third packet. This case is illustrated in Fig. 4. In this case, we have min fe 1 ) + 2fe 2 ) + fe 3 ) fe 1 ), fe 2 ) > e 1 + e 2 + e 3 E, e 1, e 2, e ) Case 4: The transmissions of both the first and the second packets end after the arrival of the next packet. This case is Fig. 2. Case 1. Fig. 3. Case 2. illustrated in Fig. 5. In this case, we have min 3fe 1 ) + 2fe 2 ) + fe 3 ) 2 fe 1 ) >, fe 1 ) + fe 2 ) > + e 1 + e 2 + e 3 E, e 1, e 2, e ) As we see, the sub-problems in 9), 10), 11) and 12) are similar in structure, except for different coefficients in front of the transmission delay times, fe i ), in the cost function. In addition, each problem has a different constraint set, which are all convex due to the monotonicity of fe i ) in e i. In order to solve the optimization problem in 8), we need to solve the four optimization problems in 9), 10), 11) and 12), and take the solution that gives us the smallest cost function, i.e., overall delay. Even though each problem is differentiable and convex, the number of problems to be solved increases exponentially with the number of packets, making this approach intractable for practical scenarios with many packet arrivals. A. An Iterative Approach Because of the intractability of the global problem, in this section, we consider developing an iterative algorithm, which at any given iteration, considers a smaller local sub-problem. Similar to the FlowRight algorithm developed in [3], in this section, we consider optimizing two of the variables, the energies allocated to two consecutive packets, at any iteration, when the rest of the variables, the energies allocated to the rest of the packets, are fixed. Initially, we allocate the total energy E to the first packet. Then, we consider the first two packets, and optimize the distribution of the total energy E over these two packets, in a way to minimize the overall delay, while we keep the energies allocated to the rest of the packets fixed. We continue this process until we reach the last packet, then we return to the first packet. We express the local optimization problem in terms of the energies of two consecutive packets, as follows min D j e k i, e k i+1) j=i e k i + e k i+1 = e k 1 i + e k 1 i+1, ek i, e k i ) where e k 1 i and e k 1 i+1 denote the energies of the packets in the previous iteration. This problem can be solved relatively easily as it essentially is a single-variable optimization problem. It is easy to prove that this algorithm converges to a fixed point, since the algorithm monotonically decreases the cost

4 d n 1 2 Fig. 4. Case 3. Fig. 5. Case 4. function which is lower bounded by zero. If the objective function was twice-differentiable, we could be sure that the algorithm converges to the globally optimum solution. Since our cost function is not differentiable at some points, the algorithm may converge to a strictly sub-optimal fixed point. Reference [9] proposes two approaches to solve the difficulty introduced by non-differentiability in network flow problems: multiple node relaxation method, and ɛ-relaxation method. We adopt these two methods here in order to escape sub-optimal fixed points. Following multiple node relaxation method, we consider sub-problems involving three or more packets, as opposed to two packets as we have done above. Similarly, following the ɛ-relaxation method, we move a small amount of energy from one packet to another to perturb a suboptimal fixed point. Experimentally, we have observed that both methods improve the convergence of the algorithm. B. A Dynamic Programming Approach In this section, we develop a DP approach to our delay minimization problem. In particular, we partition the problem into M stages, and define the state space to be E A, where E includes the possible amounts of energy remaining at the current stage and A is the set of possible queuing times associated with the packet. Specifically, in stage n, we define S n e, a) to be the minimal delay for the last M n packets, given the total energy remaining is e and the waiting time in the queue for the n-th packet is a, as shown in Fig. 6. Then, we have the following recursive relationship S n e, a) = min {a + fe n) 0 e n e +S n+1 e en, a + fe n ) d n ) +)} 14) for n = 1, 2,, M 1, and S M+1 e, a) = 0. During the process of solving the recursive equations backwards, we keep track of e n that leads to the minimum value. Let us denote the minimizing values as ê n e, a) for n = 1, 2,, N. After computing the functions {S n e, a), 0 e E} in a backward recursion and obtaining the ê n e, a), we get the optimal energy allocation strategy as e 1 = ê 1 E, 0). For n = 2,, N, a n = a n 1 + fe n 1 ) d n 1 ) + ) n 1 e n = ê n E e i, a i 15) Fig. 6. a n fe n ) a n+1 System model for the dynamic programming approach. Since getting a closed form solution for the recursive equations appears to be intractable, we perform numerical approximation instead. To this end, we quantize the state space into a finite number of discrete states. The step size of the quantization decides the size of the state space. Specifically, if there are N levels for the energy and J levels for the waiting time, for each packet we have N J different states. The number of evaluations of a + fe n ) + S n+1 [e e n, a + fe n ) d n ) + ] is once per quantized e n for each quantized state for each stage. Thus, the number of basic evaluations is N 2 JM, and the number of calculations grows linearly with the total number of packets M. We note that we can use the DP approach for more general cases where the packet arrivals are modeled as a random process, and the delays are calculated as expectations. In addition, we can incorporate the fading nature of the wireless channel, as well as develop online algorithms. III. SCENARIO II: PACKETS READY BEFORE TRANSMISSION STARTS In many situations, such as multimedia communications, the source video, music, etc.) may be available at the server waiting to be downloaded to their destinations. In sensor networks, a node may have gathered a number of packets before the transmission starts. In these scenarios, minimizing the overall transmission delay with a given amount of energy is also an important problem. We assume that there are M packets available at the transmitter at t = 0; see Fig. 7. Therefore, for the i-th packet, the delay D i can be expressed as i i D i = τ k = fe k ) 16) k=1 k=1 Then, our optimization problem becomes min M i + 1)fe i ) e i E e i 0, i = 1,, M 17) We note that, since all the packets have arrived before the transmission starts, the cost function has a fixed form, and we do not need to use the ) + function. This makes the optimization problem tractable. The problem in 17) is a convex optimization problem, and there exists a unique global optimum solution that satisfies the KKT optimality conditions. We note that because of property v) of fe), no e i can be zero, as it would require the cost function to go to infinity. As a result, the KKTs can be expressed as M i + 1)f e i ) + λ = 0 18)

5 Fig. 7. starts. i.e., as fe 1 ) fe 2 ) fe 3 ) System model when all packets are ready before the transmission ) e i = f 1 λ, i = 1, 2,, M 19) M i + 1 where λ is the non-negative Lagrange multiplier which is chosen such that i k=1 e k = E. In the following, we also devise an iterative algorithm to solve this problem. Following the procedure described in the previous section, considering two variables at a time, the local optimization in the k-th iteration becomes min M i + 1)fe k i ) + M i)fe k i+1) e k i + e k i+1 = e k 1 i + e k 1 i+1, ek i, e k i ) Following a similar analysis as before, we know that e k converges to a fixed point, ē, as the cost function is monotonically decreasing and is lower bounded. We need to show that ē is the solution to 17). From the KKTs of the local optimization, we have Mf ē 1 ) = M 1)f ē 2 ) = = f ē M ) 21) We also have M ēi = E. Therefore, ē satisfies the global KKT conditions in 18) and is the globally optimal point. Based on the properties of fe), we know that f e) is negative and monotonically increasing in e. From 21), we have f ē 1 ) > f ē 2 ) > > f ē M ). Therefore, at the optimal point, the energy spent for each packet monotonically decreases in the order of transmission. Thus, earlier packets are assigned larger energies and therefore, are transmitted quicker than the later ones. Therefore, this model for the delay minimization problem yields a solution which is in contrast with the principle of lazy scheduling that the model in [1] resulted in. IV. SIMULATION RESULTS We generate a short sequence of packets, with inter-arrival times d = [ ]. The first packet arrives at time t = 0. We choose a simple function to use in our simulations: fe) = 1/e, which satisfies all of the stated properties for fe). We use five algorithms, including our iterative algorithm, the versions of it with dimension relaxation, and ɛ- perturbation methods, DP based algorithm and built-in Matlab optimization functions. Simulation results indicate that DP based algorithm always converges to the solution that the built-in Matlab function finds. In Fig. 8, we observe that our iterative algorithm converges to the solution the built-in Matlab function finds. However, in Fig. 9, we observe that there is a gap between the convergence point of our iterative algorithm and the Matlab solution. We note that, at the point that our algorithm converges to, the departure time of the third packet coincides with the arrival time of the fourth packet. This means that our algorithm converges to a non-differentiable sub-optimal Overall delay Iterative algorithm Optimal solution by Matlab Iteration index Fig. 8. Overall delay as a function of the iteration index, when E = 4.8. Overall delay Iterative algorithm Dimension 3 relaxation ε pertubation Optimal solution by Matlab Iteration index Fig. 9. Overall delay as a function of the iteration index, when E = 4.5 fixed point. When we apply dimension-3 relaxation and ɛ- perturbation methods, we observe that the modified version of our algorithm escapes the sub-optimal fixed point and converges to the optimal solution. REFERENCES [1] E. Uysal-Biyikoglu, B. Prabhakar, and A. El Gamal, Energy-efficient packet transmission over a wireless link, IEEE/ACM Transactions on Networking, vol. 10, pp , [2] A. El Gamal, C. Nair, B. Prabhakar, E. Uysal-Biyikoglu, and S. Zahedi, Energy-efficient scheduling of packet transmissions over wireless networks, IEEE Infocom, vol. 3, pp , [3] E. Uysal-Biyikoglu and A. El Gamal, On adaptive transmission for energy efficiency in wireless data networks, IEEE Transactions on Information Theory, vol. 50, pp , Dec [4] R. A. Berry and R. G. Gallager, Communication over fading channels with delay constraints, IEEE Transactions on Information Theory, vol. 48, pp , May [5] T. Holliday and A. Goldsmith, Optimal power control and sourcechannel coding for delay constrained traffic over wireless channels, Proc. IEEE Int. Conf. Communications, vol. 2, pp , Apr/May [6] R. Negi and J. M. Cioffi, Delay-constrained capacity with casual feedback, IEEE Transactions on Information Theory, vol. 48, pp , Sep [7] I. Bettesh and S. Shamai, Optimal power and rate control for minimal average delay: The single-user case, IEEE Transactions on Information Theory, vol. 52, pp , Sep [8] A. Fu, E. Modiano, and J. Tsitsiklis, Optimal energy allocation for delay-constrained data transmission over a time-varying channel, IEEE Infocom, vol. 2, pp , [9] D. Bertsekas and J. Tsitsiklis, Parallel and Distributed Computation: Numericcal Methods. Athena Scientific, 1997.

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER Elif Uysal-Biyikoglu, Member, IEEE, and Abbas El Gamal, Fellow, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER Elif Uysal-Biyikoglu, Member, IEEE, and Abbas El Gamal, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 3081 On Adaptive Transmission for Energy Efficiency in Wireless Data Networks Elif Uysal-Biyikoglu, Member, IEEE, Abbas El Gamal,

More information

Energy-efficient Transmission over a Wireless Link via Lazy Packet Scheduling

Energy-efficient Transmission over a Wireless Link via Lazy Packet Scheduling Energy-efficient Transmission over a Wireless Link via Lazy Packet Scheduling Balaji Prabhakar Elif Uysal Biyikoglu and Abbas El Gamal Information Systems Laboratory Stanford University Stanford CA 35

More information

Some problems in ad hoc wireless networking. Balaji Prabhakar

Some problems in ad hoc wireless networking. Balaji Prabhakar Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data

More information

Lagrangian Relaxation: An overview

Lagrangian Relaxation: An overview Discrete Math for Bioinformatics WS 11/12:, by A. Bockmayr/K. Reinert, 22. Januar 2013, 13:27 4001 Lagrangian Relaxation: An overview Sources for this lecture: D. Bertsimas and J. Tsitsiklis: Introduction

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 11, JUNE 1, Optimal Wireless Communications With Imperfect Channel State Information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 11, JUNE 1, Optimal Wireless Communications With Imperfect Channel State Information IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 11, JUNE 1, 2013 2751 Optimal Wireless Communications With Imperfect Channel State Information Yichuan Hu, Student Member, IEEE, and Alejandro Ribeiro,

More information

Novel Decentralized Coded Caching through Coded Prefetching

Novel Decentralized Coded Caching through Coded Prefetching ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu

More information

Efficient Power Management in Wireless Communication

Efficient Power Management in Wireless Communication Efficient Power Management in Wireless Communication R.Saranya 1, Mrs.J.Meena 2 M.E student,, Department of ECE, P.S.R.College of Engineering, sivakasi, Tamilnadu, India 1 Assistant professor, Department

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2

Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 X. Zhao 3, P. B. Luh 4, and J. Wang 5 Communicated by W.B. Gong and D. D. Yao 1 This paper is dedicated to Professor Yu-Chi Ho for his 65th birthday.

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing

More information

Probabilistic Graphical Models

Probabilistic Graphical Models School of Computer Science Probabilistic Graphical Models Theory of Variational Inference: Inner and Outer Approximation Eric Xing Lecture 14, February 29, 2016 Reading: W & J Book Chapters Eric Xing @

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs 15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Optimality of Periodwise Static Priority Policies in Real-time Communications

Optimality of Periodwise Static Priority Policies in Real-time Communications Optimality of Periodwise Static Priority Policies in Real-time Communications I-Hong Hou, Anh Truong, Santanu Chakraborty and P. R. Kumar Abstract We consider the problem of real-time communication with

More information

Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks

Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks Teymoori P, Yazdani N. Delay-constrained optimized packet aggregation in high-speed wireless networks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 28(3): 525 539 May 2013. DOI 10.1007/s11390-013-1353-1

More information

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Local and Global Minimum

Local and Global Minimum Local and Global Minimum Stationary Point. From elementary calculus, a single variable function has a stationary point at if the derivative vanishes at, i.e., 0. Graphically, the slope of the function

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

The Maximum Throughput of A Wireless Multi-Hop Path

The Maximum Throughput of A Wireless Multi-Hop Path The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The

More information

IN A SEMINAL paper published in 1995, Shenker [18] discussed

IN A SEMINAL paper published in 1995, Shenker [18] discussed 1240 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 Distributed Rate Allocation for Inelastic Flows Prashanth Hande, Shengyu Zhang, and Mung Chiang, Member, IEEE Abstract A common assumption

More information

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC

SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port

More information

Dual Subgradient Methods Using Approximate Multipliers

Dual Subgradient Methods Using Approximate Multipliers Dual Subgradient Methods Using Approximate Multipliers Víctor Valls, Douglas J. Leith Trinity College Dublin Abstract We consider the subgradient method for the dual problem in convex optimisation with

More information

OVER THE last decades, there has been a significant

OVER THE last decades, there has been a significant IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 4, AUGUST 2005 827 Non-Convex Optimization Rate Control for Multi-Class Services in the Internet Jang-Won Lee, Member, IEEE, Ravi R. Mazumdar, Fellow,

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

INTEGRATION of data communications services into wireless

INTEGRATION of data communications services into wireless 208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

END-TO-END estimation of the spare capacity along a network

END-TO-END estimation of the spare capacity along a network 130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,

More information

Optimal network flow allocation

Optimal network flow allocation Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement

More information

Optimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space

Optimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering March 23 Optimum Scheduling and Memory Management in Input Queued Switches with Finite

More information

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks

Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Delay-Optimal Probabilistic Scheduling in Green Communications with Arbitrary Arrival and Adaptive Transmission

Delay-Optimal Probabilistic Scheduling in Green Communications with Arbitrary Arrival and Adaptive Transmission Delay-Optimal Probabilistic Scheduling in Green Communications with Arbitrary Arrival and Adaptive Transmission Xiang Chen, Wei Chen, Joohyun Lee,andNessB.Shroff Tsinghua National Laboratory for Information

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

IN mobile wireless networks, communications typically take

IN mobile wireless networks, communications typically take IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL 2, NO 2, APRIL 2008 243 Optimal Dynamic Resource Allocation for Multi-Antenna Broadcasting With Heterogeneous Delay-Constrained Traffic Rui Zhang,

More information

Convex Optimization MLSS 2015

Convex Optimization MLSS 2015 Convex Optimization MLSS 2015 Constantine Caramanis The University of Texas at Austin The Optimization Problem minimize : f (x) subject to : x X. The Optimization Problem minimize : f (x) subject to :

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Stochastic Approximation and Transaction-Level Model for IP Network Design

Stochastic Approximation and Transaction-Level Model for IP Network Design Stochastic Approximation and Transaction-Level Model for IP Network Design Linhai He and Jean Walrand Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley,

More information

Nonlinear Programming

Nonlinear Programming Nonlinear Programming SECOND EDITION Dimitri P. Bertsekas Massachusetts Institute of Technology WWW site for book Information and Orders http://world.std.com/~athenasc/index.html Athena Scientific, Belmont,

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

16.410/413 Principles of Autonomy and Decision Making

16.410/413 Principles of Autonomy and Decision Making 16.410/413 Principles of Autonomy and Decision Making Lecture 17: The Simplex Method Emilio Frazzoli Aeronautics and Astronautics Massachusetts Institute of Technology November 10, 2010 Frazzoli (MIT)

More information

Introduction to Machine Learning

Introduction to Machine Learning Introduction to Machine Learning Maximum Margin Methods Varun Chandola Computer Science & Engineering State University of New York at Buffalo Buffalo, NY, USA chandola@buffalo.edu Chandola@UB CSE 474/574

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information

Principles of Wireless Sensor Networks. Fast-Lipschitz Optimization

Principles of Wireless Sensor Networks. Fast-Lipschitz Optimization http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 5 Stockholm, October 14, 2011 Fast-Lipschitz Optimization Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se

More information

10. Network dimensioning

10. Network dimensioning Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning

More information

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

A Survey of Recent Results on Real-Time Wireless Networking

A Survey of Recent Results on Real-Time Wireless Networking A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2593 On the Throughput, Capacity, and Stability Regions of Random Multiple Access Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow,

More information

Optimizing Data Freshness, Throughput, and Delay in Multi-Server Information-Update Systems

Optimizing Data Freshness, Throughput, and Delay in Multi-Server Information-Update Systems Optimizing Data Freshness, Throughput, and Delay in Multi-Server Information-Update Systems Ahmed M. Bedewy, Yin Sun, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus,

More information

SINCE the publication of the seminal paper [1] by Kelly et al.

SINCE the publication of the seminal paper [1] by Kelly et al. 962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Price-Based Distributed Algorithms for Rate-Reliability Tradeoff in Network Utility Maximization Jang-Won Lee, Member, IEEE,

More information

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows

A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows 1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,

More information

College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007

College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 CS G399: Algorithmic Power Tools I Scribe: Eric Robinson Lecture Outline: Linear Programming: Vertex Definitions

More information

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction

PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING KELLER VANDEBOGERT AND CHARLES LANNING 1. Introduction Interior point methods are, put simply, a technique of optimization where, given a problem

More information

Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.

Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices. Paper presentation Ultra-Portable Devices Paper: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks Andrea J. Goldsmith, Stephen B. Wicker IEEE Wireless Communication August 2002, pages

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER /$ IEEE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER /$ IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4081 Node-Based Optimal Power Control, Routing, Congestion Control in Wireless Networks Yufang Xi, Student Member, IEEE, Edmund M.

More information

Lecture 4 Duality and Decomposition Techniques

Lecture 4 Duality and Decomposition Techniques Lecture 4 Duality and Decomposition Techniques Jie Lu (jielu@kth.se) Richard Combes Alexandre Proutiere Automatic Control, KTH September 19, 2013 Consider the primal problem Lagrange Duality Lagrangian

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class

Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Aniruddha Diwan ECE Department Indian Institute of Science Bangalore

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks

Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks 2002 Conference on Information Sciences and Systems, Princeton University, March 20-22, 2002 Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks

More information

Joint Rate Control and Scheduling in Multihop Wireless Networks

Joint Rate Control and Scheduling in Multihop Wireless Networks Joint Rate Control and Scheduling in Multihop Wireless Networks Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering, Purdue University West Lafayette, IN 47907, U.S.A. {linx, shroff}@ecn.purdue.edu

More information

The Prices of Packets: End-to-end delay Guarantees in Unreliable Networks

The Prices of Packets: End-to-end delay Guarantees in Unreliable Networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. See http://creativecommons.org/licenses/by-nc-nd/3.0/ The Prices of Packets: End-to-end

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

CONLIN & MMA solvers. Pierre DUYSINX LTAS Automotive Engineering Academic year

CONLIN & MMA solvers. Pierre DUYSINX LTAS Automotive Engineering Academic year CONLIN & MMA solvers Pierre DUYSINX LTAS Automotive Engineering Academic year 2018-2019 1 CONLIN METHOD 2 LAY-OUT CONLIN SUBPROBLEMS DUAL METHOD APPROACH FOR CONLIN SUBPROBLEMS SEQUENTIAL QUADRATIC PROGRAMMING

More information

LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION. 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach

LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION. 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach Basic approaches I. Primal Approach - Feasible Direction

More information

THERE are a number of fundamental optimization problems

THERE are a number of fundamental optimization problems IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 1359 Modeling and Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Networks Ritesh Madan, Member, IEEE, Shuguang

More information

Last topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far:

Last topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far: Last topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far: I Strength of formulations; improving formulations by adding valid inequalities I Relaxations and dual problems; obtaining

More information

Traffic Pattern Analysis in Multiprocessor System

Traffic Pattern Analysis in Multiprocessor System International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 6, Number 1 (2013), pp. 145-151 International Research Publication House http://www.irphouse.com Traffic Pattern Analysis

More information

Joint Source Coding and Data Rate Adaptation for Energy Efficient Wireless Video Streaming

Joint Source Coding and Data Rate Adaptation for Energy Efficient Wireless Video Streaming 1710 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 10, DECEMBER 2003 Joint Source Coding and Data Rate Adaptation for Energy Efficient Wireless Video Streaming Carlos E. Luna, Associate

More information

MP-DSM: A Distributed Cross Layer Network Control Protocol

MP-DSM: A Distributed Cross Layer Network Control Protocol MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O Neill, Yan Li, and Stephen Boyd Department of Electrical Engineering Stanford University dconeill, liyan, boyd@stanford.edu Abstract

More information

RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION

RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION Franco Blanchini,1 Felice Andrea Pellegrino Dipartimento di Matematica e Informatica Università di Udine via delle Scienze, 208 33100, Udine, Italy blanchini@uniud.it,

More information

packet-switched networks. For example, multimedia applications which process

packet-switched networks. For example, multimedia applications which process Chapter 1 Introduction There are applications which require distributed clock synchronization over packet-switched networks. For example, multimedia applications which process time-sensitive information

More information

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop

More information

Fast-Lipschitz Optimization

Fast-Lipschitz Optimization Fast-Lipschitz Optimization DREAM Seminar Series University of California at Berkeley September 11, 2012 Carlo Fischione ACCESS Linnaeus Center, Electrical Engineering KTH Royal Institute of Technology

More information

Measurement Based Routing Strategies on Overlay Architectures

Measurement Based Routing Strategies on Overlay Architectures Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Characterizing Improving Directions Unconstrained Optimization

Characterizing Improving Directions Unconstrained Optimization Final Review IE417 In the Beginning... In the beginning, Weierstrass's theorem said that a continuous function achieves a minimum on a compact set. Using this, we showed that for a convex set S and y not

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

A NEW ALGORITHM FOR JITTER CONTROL IN WIRELESS NETWORKS FOR QUALITY OF SERVICE

A NEW ALGORITHM FOR JITTER CONTROL IN WIRELESS NETWORKS FOR QUALITY OF SERVICE Int. J. Elec&Electr.Eng&Telecoms. 2013 B Santosh Kumar et al., 2013 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 2, No. 2, April 2013 2013 IJEETC. All Rights Reserved A NEW ALGORITHM FOR JITTER CONTROL

More information

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods

Unconstrained Optimization Principles of Unconstrained Optimization Search Methods 1 Nonlinear Programming Types of Nonlinear Programs (NLP) Convexity and Convex Programs NLP Solutions Unconstrained Optimization Principles of Unconstrained Optimization Search Methods Constrained Optimization

More information